Resources

Insights from the field.

Case studies, white papers, and expert articles from a team that has been protecting sensitive data since 1986.

Articles
Press Release: Announcing Encryptionizer Winter 2026 Release and EKM Upgrade
NetLib Security Announces Winter 2026 Release with AI-Driven Enhancements and Major Upgrades to Encryptionizer Key Manager for Data Security That Moves at the Speed of…
March 17, 2026 3 min read → Read
Blog
Mega Breach of Payment Processor Conduent
A provider of payment and document processing services to multiple state governments across the USA naturally has access to the critical data of countless citizens. …
March 10, 2026 2 min read → Read
Blog
Tracking the Cyber Pucks at the Olympics
As one of my favorite times of four years is now underway, it comes as no surprise that the Winter Olympics have already had to…
February 19, 2026 3 min read → Read
Blog
Voice Phishing Ensnares Google and Microsoft Accounts
Following up on reports of the recent SoundCloud data breach, we now hear reports that the ShinyHunter culprits have claimed responsibility for voice phishing (or…
February 11, 2026 2 min read → Read
Articles
2026 Is Here and Encryption Is No Longer Optional
NetLib Security announces the general availability of Encryptionizer Winter 2026 Release From the desk of the CTO, David Stonehill: Encryption in 2026 Means Designing for…
February 2, 2026 5 min read → Read
Articles
Safer Passwords: The Relationship Advice Your Security Stack Needs
February brings two of our favorite holidays: Valentine’s Day and Change your Password Day (Feb 1)! These are two reminders that trust—online or off—should be…
February 2, 2026 4 min read → Read
Blog
State by State Takedown of Cybercrime
Individual U.S. states are still in the process of enacting their own data protection statutes.  Kentucky is now the latest with the Kentucky Consumer Data…
January 19, 2026 3 min read → Read
Blog
New Year, New Personal Data Stolen
NetLib Security doesn’t have a SoundCloud account to promote if you see this article, but if we did, we probably wouldn’t be too thrilled right…
January 7, 2026 2 min read → Read
Articles
NetLib Security predictions 2026: AI generated scams and phishing
As seen in App Developer Magazine, Featured Story, Jan 5, 2026 David Stonehill, CTO, NetLib Security offers his insight into what 2026 will hold for…
January 7, 2026 5 min read → Read
Blog
The “Amazon of Korea” Hit by Mega Breach
If the phrase “data breach affecting most of a country’s population” has become somewhat tiresome in a world of Yahoo and National Public Data breaches,…
December 11, 2025 3 min read → Read
Articles
10 Common Mistakes When Securing Legacy Applications
tl;dr Securing legacy applications is crucial but often mishandled. This article walks through 10 common mistakes that leave aging systems vulnerable, from ignoring data-at-rest encryption…
December 5, 2025 5 min read → Read
Blog
Silent Night, Cyber Fight: Why Holiday Cybercrime Is Surging in the Age of Agentic Commerce
Everybody’s planning to shop online for the holidays this year (well, 89% of customers according to McAfee).  I know I am.  I also know that…
November 17, 2025 3 min read → Read
White Papers
Medical Device Encryption & Security
Safeguarding Medical Devices through Robust Encryption and Security Protocols In today’s healthcare landscape, where interconnected devices and digital information sharing are the norm, implementing robust…
November 12, 2025 6 min read → Read
Blog
Unencrypted Data in Orbit
Space.  It’s called the final frontier, where no one has gone before.  Well, it seems like data encryption has yet to make that one small…
October 29, 2025 2 min read → Read
White Papers
Application Encryption and Security
The Crucial Importance of Application Security in Today’s Digital Landscape In our increasingly interconnected world, where technology permeates every aspect of our lives, the need…
October 22, 2025 5 min read → Read
White Papers
Security on SQL Express: Protecting Your Data from Digital Crooks
TL;DR: Many users mistakenly assume SQL Server Express includes the same security features as the full version. Relying on SQL Express without additional encryption, however,…
October 22, 2025 6 min read → Read
Blog
Stealing Data While No One is Looking
A new poll reveals widespread, bipartisan agreement among American voters on at least one issue: data security/privacy.  According to the survey, 96% of voters find…
October 15, 2025 2 min read → Read
Blog
Data Security in Flux
Bad actors looking to exploit technical vulnerabilities are everywhere: just see how the US Secret Service had to dismantle a network of over 100,000 SIM…
October 2, 2025 2 min read → Read
Articles
NetLib Security on the Cyber Show Podcast: Encryption Is Not Optional
On The Cyber Show podcast, NetLib Security CTO David Stonehill warns that only high-performance encryption can protect organizations against today’s risks and tomorrow’s challenges. On…
September 30, 2025 4 min read → Read
Blog
Checkmate, Data Breach
Online chess is one of the classic, time-honored traditions of the digital age – and yet there haven’t been too many data breaches in that…
September 17, 2025 2 min read → Read
Blog
Yet More Spilled Tea Data
Hardly any time has passed since the Tea dating app breach, and already the counter app launched in opposition to it – TeaOnHer, a mirror…
August 21, 2025 2 min read → Read
Blog
Shocking Lack of Encryption Exposes Data
Update 8/11 – Ten potential class action lawsuits have now been filed against the Tea app, each one accusing developer Tea Dating Advice Inc. of negligence…
August 6, 2025 3 min read → Read
Articles
Layered Security: Where Does Data at Rest Encryption Fit?
Layered security uses multiple defenses against cyber threats. Data at rest encryption is vital, protecting stored data even if other layers are breached and ensuring…
July 28, 2025 7 min read → Read
Articles
Still Using Visual FoxPro? Lock It Down with Encryption
TL;DR: Ever wonder what happened to Visual FoxPro? Turns out, it’s still alive and kicking for thousands of businesses and government agencies, even though Microsoft…
July 28, 2025 5 min read → Read
Blog
The Data Devils Wear Prada
Cyber criminals would probably say data breaches are always in fashion.  Now, with French luxury retailer Louis Vuitton sending out breach notifications to customers in…
July 21, 2025 2 min read → Read
Blog
Everyone’s Data is a Target
It seems more and more common these days that the sum total of breached data is in the billions.  Researchers this month have announced the…
June 27, 2025 2 min read → Read
Blog
Data Breaches Don’t Discriminate
When applications are intentionally designed to secretly spy on unsuspecting users, it’s no great shame when the operators themselves experience a data breach that compromises…
June 4, 2025 3 min read → Read
Blog
Are People Prepared for Quantum Cyber Attacks?
We recently examined the evolving trends, predictions and concerns in the realm of quantum computing.  The capability to process vast stores of data at unprecedented…
May 13, 2025 2 min read → Read
Articles
Pitfalls to Avoid with Data at Rest Encryption
Data at rest encryption is a critical component of any modern cybersecurity strategy. It protects sensitive information stored in databases, file systems, and other storage…
May 8, 2025 4 min read → Read
Blog
Data Vulnerable to Critical Flaws and Third Parties
Further data breach news for the automotive industry, in connection with a third-party vendor: this time it is car rental company Hertz that has announced…
April 23, 2025 2 min read → Read
Articles
Encryption in a Quantum World: Symmetric vs. Asymmetric
In 2023, researchers demonstrated a quantum computer’s ability to crack encryption algorithms previously thought unbreakable. This breakthrough underscored the imminent threat that quantum computing poses…
April 21, 2025 6 min read → Read
Articles
Data Loss Prevention (DLP) & Data at Rest Encryption
In the face of increasingly sophisticated cyber threats and data breaches, organizations must prioritize the protection of sensitive information. Implementing a multi-layered security approach is…
April 18, 2025 7 min read → Read
Blog
Oracle Downplays Data Breach in the Cloud
Just when you thought your data was safe in the Cloud, it might turn out to be…well, not so much.  Despite Oracle’s initial denials and…
April 10, 2025 2 min read → Read
Blog
Allstate Insurance Dropped the Ball on Ensuring Data Security
More news of unencrypted, plaintext data from a major organization being left in the open for cyber criminals.  Not merely a set of discarded hard…
March 18, 2025 2 min read → Read
Articles
Ransomware Threat Alert: Safeguard Your Data With This Checklist
The proliferation of ransomware attacks poses a formidable threat to organizations across all sectors. With an alarming frequency of 1.7 million incidents daily, equating to…
March 6, 2025 2 min read → Read
Blog
Is Sensitive Data Your New Carry On Luggage?
Sensitive data on unencrypted devices has become way too common these days, popping up in places they definitely shouldn’t be. We’ll get back to why…
February 27, 2025 3 min read → Read
Blog
More Internet of Things Insecurity
Another week, another exposure of billions of records of sensitive data.  The integrity of Internet of Things-based (IoT) cybersecurity has always been a major concern…
February 18, 2025 2 min read → Read
Blog
Change Healthcare and DeepSeek Data Security
Last year, estimates of the Change Healthcare data breach were that it could cost over $2 billion in incident response alone.  Estimates for a while…
February 5, 2025 2 min read → Read
Articles
AES is the Gold Standard: Abandoning Blowfish and 3DES
In today’s digital landscape, where the security of sensitive data is paramount, businesses must prioritize effective encryption methods to safeguard information while ensuring compliance with…
February 5, 2025 9 min read → Read
Blog
Personal Data of the Most Sensitive Kind
Student data is a valuable resource for cyber criminals.  Minors have plenty of sensitive personal information, but may lack awareness of the risks it carries. …
January 22, 2025 2 min read → Read
Blog
New Regulations for the Internet of Things?
Government-mandated standards and practices are on the verge of sweeping changes not perhaps seen since Europe’s GDPR.  Reflecting this shift are incidents like last year’s…
January 13, 2025 2 min read → Read
Blog
Last Minute Breach News of 2024
End of year for cybersecurity means planning annual budgets, evaluation, and last minute fines against violators of regulations.  While healthcare has been an especially hard…
January 3, 2025 3 min read → Read
Articles
NetLib Security predictions 2025: Generative AI, cybersecurity, and data privacy
As seen in App Developer Magazine, Featured Story, Jan 2, 2025 The leading prediction for 2025 will sound familiar: Generative AI directly affects your privacy…
January 3, 2025 5 min read → Read
Blog
NPD Shutters and Hackers Trending Younger
The average age of those arrested for cybercrime is trending younger and younger, currently in the teens.  The latest report from Experian, predicting upcoming data…
December 11, 2024 3 min read → Read
Blog
Still More Snowflake Data Breach Ripples
The breach of cloud provider Snowflake continues to have more ripples on multiple fronts.  The US government has now accused a pair of culprits as…
November 25, 2024 2 min read → Read
Blog
Smells Like Teen Cybercrime
It’s been a staple trope of fiction for a while now, the shadowy, mysterious hacker who eludes all of law enforcement’s effort, until at last…
November 15, 2024 2 min read → Read
Blog
Human Toll of Data Breaches
Social engineering has become such a prominent factor in data breaches – around two-thirds of them according to the latest Verizon Data Breach Investigations Report…
November 6, 2024 2 min read → Read
Articles
Data Masking vs. Data Encryption: Choosing the Right Approach for Your Business
It is critically important to protect your data. Luckily, there are a number of methods available to help you secure your most valuable resources. In…
October 29, 2024 7 min read → Read
Blog
Gmail Phishing Scam Fools Experts
Cyber criminals continue to eagerly exploit new AI capabilities to try robbing you of your data.  Ever increasing their sophistication, the latest major news is…
October 23, 2024 2 min read → Read
Articles
Recent Data Breaches & Key Lessons to Learn
Every company, regardless of size, can become the victim of a data breach. Cybercriminals, who often sell stolen data on the dark web, continue to…
October 16, 2024 8 min read → Read
Blog
Spear Phishing and Comcast’s Data Breach
In the same week that Microsoft disrupted Russian spear phishing operations, telecom giant Comcast has had to notify around 238,000 current and former customers that…
October 9, 2024 2 min read → Read
Articles
PostgreSQL: What You Need to Know
PostgreSQL, widely acclaimed as the most advanced open-source relational database, has established itself as a cornerstone in the realm of data management. This post aims…
October 9, 2024 6 min read → Read
Blog
Streaming Security and Dark Web Markets
As if the burden of managing numerous streaming services, their rising costs, incessant ads and other consumer-unfriendly practices weren’t enough, people also have to consider…
September 25, 2024 2 min read → Read
Blog
Data Breaches Beyond the National Public
A number of data breaches have made the news these last couple of weeks, managing to creep their way around the edges of the predominant…
September 11, 2024 2 min read → Read
Blog
Monitoring the Gargantuan NPD Breach
“Local Florida man exposes…millions of Social Security numbers?”  Ok, that’s not usually how those headlines go, and in this case it’s a Florida based firm,…
August 22, 2024 2 min read → Read
Blog
Data Security Failures: The Cost to Industry
Despite a marginal decrease in data breach expenses, the healthcare industry still foots a bill when an incident occurs: an average of $9.8 million per…
August 9, 2024 3 min read → Read
Articles
Security Risks & Prevention Across Industries
From sensitive customer information to proprietary research data, safeguarding valuable assets is paramount. However, with the ever-evolving landscape of cyber threats, ensuring robust data security…
August 1, 2024 19 min read → Read
Blog
Consolidation and Integration of Big Tech
Not one day after my last post, snarking about AI, movies like Terminator and their unlearned lessons, and one of the most Skynet-esque global computer…
July 29, 2024 2 min read → Read
Blog
How Seriously Do We Take AI Data Security Risks?
I swear, sometimes it’s like nobody watched the Terminator or Matrix movies.  News has come out that a hacker accessed proprietary information from OpenAI on…
July 16, 2024 2 min read → Read
Blog
Change in the Ransomware Status Quo?
A curiously uncorroborated claim by famous Russian ransomware group, LockBit, is stirring up the news this week.  Their newest threat is the release of 33…
June 28, 2024 2 min read → Read
Blog
Blackbaud’s Latest Data Breach Settlement
Four years since the event, Blackbaud is continuing to pay for its 2020 data breach.  Most recently, they are now settling against charges of violations…
June 20, 2024 2 min read → Read
Blog
Ripples of the Snowflake Breach
Ticketmaster and its parent corporation, Live Nation, are being particularly reticent on details surrounding a data breach against the live events giant.  Aside from the…
June 11, 2024 2 min read → Read
Articles
Data Security: Tokenization vs. Encryption
Encryption and tokenization both aim to protect data, but the manner in which each method does so varies. It’s important to begin by understanding the…
May 30, 2024 6 min read → Read
Articles
Data at Rest: Myths, Reality and Best Practices
A staggering 59% of organizations fell victim to ransomware attacks in 2024, as reported by Sophos. 94%  of victims reported that their backups were one…
May 28, 2024 5 min read → Read
Blog
Recent reports on the exploitation of cyber weaknesses
Vulnerability exploitation as a source of data security incidents is at a record high, according to the latest Verizon Data Breach Investigations Report (DBIR).  Compared…
May 22, 2024 2 min read → Read
Blog
Cyber Threats to Critical Infrastructure Persist
Cyberattacks against critical infrastructure is a subject you might often hear in the news as a potential risk of our connected, online world.  Never has…
April 29, 2024 2 min read → Read
Blog
Forward Progress on America’s GDPR?
Congress is gradually approaching a new federal data privacy and protection standard for the US.  Proposed in 2022, the American Data Privacy and Protection Act…
April 15, 2024 3 min read → Read
Blog
From outages to data breaches for AT&T
Not even two months since a massive, nationwide outage left millions of their customers without cell service for hours, AT&T is again in the news…
April 3, 2024 3 min read → Read
Blog
Fujitsu’s breach and Microsoft’s legacy security
Japanese IT firm Fujitsu has another data breach on its hands that has put customers at risk.  After discovering malware on its corporate networks, the…
March 27, 2024 2 min read → Read
Blog
Are companies looking out for your safety?
Can you as a consumer trust organizations to look after your well-being?  There is no shortage of examples of companies skirting into questionable behavior in…
March 18, 2024 3 min read → Read
Blog
Fighting back against automated attacks
Relying on automation – that is, tools using artificial intelligence and machine learning to perform repetitive tasks rapidly and process enormous volumes of data –…
March 7, 2024 2 min read → Read
Blog
The More You Know: Smart devices in the home can lead to a data breach
Smart technology has become ingrained in countless facets of everyday life.  With the conveniences inherent in this come more and more cyber security risks.  Wyze,…
February 28, 2024 2 min read → Read
Blog
Bank of America customers have data at risk
A Bank of America data breach is the newest major example of how vulnerabilities in third-party vendors can compromise cybersecurity via the supply chain.  InfoSys…
February 20, 2024 2 min read → Read
Blog
The NEWEST, newest biggest data breach
By now, news about the most recent biggest data breach in history has spread to every corner.  Coined MOAB, or, the Mother of All Breaches,…
February 12, 2024 2 min read → Read
Articles
What’s Next for Cybersecurity and Privacy in 2024?
2023 was a significant year for cybersecurity and data privacy issues. Cybersecurity Ventures reported that worldwide cybercrime costs are projected to reach a record $10.5…
February 6, 2024 8 min read → Read
Articles
Safeguarding Data: Ransomware Defense Essentials
There are 1.7 million ransomware attacks every day, that’s 19 ransomware attacks every second of every day. These attacks result not only in financial loss…
February 2, 2024 7 min read → Read
Articles
Impact of Artificial Intelligence on Cybersecurity
As seen in AITechPark Magazine Artificial Intelligence (AI) has been developing at a rapid pace and has been integrated into a growing number of applications…
January 25, 2024 6 min read → Read
Blog
SolarWinds hackers hit Microsoft
The infamous SolarWinds data breach made headlines a few years back, in which a Russian cyber crime group breached the US Treasury and Commerce departments…
January 24, 2024 2 min read → Read
Articles
5 Data Encryption Myths Debunked
Post-pandemic, a surge in cyberattacks has forced businesses to confront the issue of cybersecurity, and more specifically, data encryption. To learn more about trends in…
January 22, 2024 4 min read → Read
Blog
Medical and Genetic Data Targeted in Breaches
A new healthcare data breach is making the headlines.  The subject: the analytics software vendor HealthEC, whose platform is used by more than a million…
January 10, 2024 2 min read → Read
Articles
Predictions for 2024: AI Impacts Both Offense and Defense in the Battle for Cybersecurity
As seen in App Developer Magazine, Featured Story, Dec 18, 2023 This is an easy call to make: NetLib Security predicts that Artificial Intelligence –…
January 4, 2024 4 min read → Read
Articles
HIPAA and Data Protection in Healthcare
As featured in Medical Device News Magazine. Healthcare organizations face many challenges: they must protect patient privacy, deliver quality care, and meet strict regulations. These…
December 8, 2023 6 min read → Read
Articles
Cybersecurity in the Post Covid-19 World
Cyberattacks happen around the clock every single day, and we rarely hear about the majority of them. During Covid-19, cyberattacks skyrocketed at an alarming rate,…
October 20, 2023 9 min read → Read
Articles
Unveiling Keys and Key Management
With the rise of cyberattacks, reliance on password protection and two-factor authentication alone is no longer enough when it comes to the safety of your…
October 5, 2023 6 min read → Read
Articles
Cybersecurity – Back to Basics
Wake Up, Your Data Is Under Attack Data security remains a top level issue around the world. No matter the size or industry, organizations are…
September 27, 2023 4 min read → Read
Articles
Encryption: Key for Secure OEM and ISV Development
Understanding what secure development entails for OEMs and ISV requires examining the differences between them and how they play an important role in everyday security.…
September 20, 2023 6 min read → Read
Articles
Choosing the Right Third-Party Encryption Product for Your Security Needs
When it comes to the security and protection of sensitive data, you might think that standard, out-of-the-box encryption is all you need. But you’d be…
July 10, 2023 7 min read → Read
Articles
MySQL and Encryptionizer for Data Encryption
MySQL is a popular open-source relational database management system that allows users to store and manage data. It serves the same purpose as many other…
June 1, 2023 5 min read → Read
Articles
You’ve Been Hacked: Security and the Human Element
Did you know humans can be hacked? It’s called social engineering. It can happen to you, and you may not even realize it…until it is…
May 16, 2023 5 min read → Read
Articles
Legacy Systems: Encryption for Aging Databases
Despite their outdated nature, legacy systems continue to play a critical role in many organizations’ day-to-day operations. These systems are often written in antiquated programming…
March 31, 2023 5 min read → Read
Articles
Encryption Requirement for Dealerships in 2023
As an auto dealership, you collect a range of personal information about your customers in the normal course of business. This can include confidential consumer…
March 23, 2023 5 min read → Read
Articles
Data at Rest vs Data in Transit
The importance of data protection cannot be overstated, especially with the exponential growth of data creation and storage in recent years. It has become imperative…
March 16, 2023 4 min read → Read
Articles
7 Databases to Use in 2023: Which is right for you?
A database stores large amounts of digital information about customers, products, employees, etc., that computers can easily access. While a spreadsheet could be a great…
March 2, 2023 7 min read → Read
Articles
How to Solve Healthcare’s Great Data Security Dilemma
Data breaches in the healthcare sector have been on the rise for some time. The reason is simple: Personally Identifiable Information (PII) is highly valuable…
January 30, 2023 4 min read → Read
Articles
Looking Back – and Ahead – in Data Security
In the world of data security, 2022 was another year of remote and hybrid work, expanded attack surfaces, and bold cyber criminals employing sophisticated methods…
December 20, 2022 5 min read → Read
Articles
Remote Work: Protecting Critical Data in a Hybrid Environment
Remote work is here to stay. One of the most enduring legacies of COVID has been the movement of personnel away from the office. Whether…
September 29, 2022 3 min read → Read
Articles
The Right Encryption Software For Developers and DBAs
The need to protect personally identifiable information (PII), protected health data (PHI), and payment card industry data (PCI) has become more critical as hacking incidents…
September 6, 2022 9 min read → Read
Articles
Key Management: Your Locksmith For Data Security
You’ve taken the first step toward securing your enterprise by encrypting your databases and critical files. Hopefully you’ve used a state-of-the-art encryption solution such as…
July 21, 2022 4 min read → Read
Articles
Legacy Systems Are Not Secure. Fixing Them Is Easy.
“If it ain’t broke, don’t fix it.” So the old adage goes. But that advice might be as outdated as your software. It’s typical for…
June 21, 2022 5 min read → Read
Articles
Protect Your Business from Malicious Hackers
An astounding 64% of companies worldwide have experienced at least one form of cyber attack. And because the pandemic accelerated the shift to telecommuting, many…
June 2, 2022 5 min read → Read
Articles
Compliance. Ignoring It Can Cost Your Business. 
Businesses are powered by data. Data is the language of our personal and professional interactions. Every transaction you make requires sharing your data with one…
April 26, 2022 4 min read → Read
Articles
Database Encryption: The Most Crucial Defensive Strategy for Your Information
Database encryption must be a part of your data protection strategy. The news is full of stories of breaches, hacks and other cyber attacks. Why?…
March 29, 2022 4 min read → Read
Articles
Privacy Laws in 2022
What’s New? COVID-19 has impacted not only our personal and professional lives, but has also continued to affect every industry, whether directly or indirectly. As…
March 1, 2022 4 min read → Read
Articles
Data Security Best Practices For Businesses in 2022
Cybersecurity is more important today than ever before. It is imperative that security policies are made and reviewed now before there is a breach. With…
January 17, 2022 5 min read → Read
Articles
The risks and costs of poor data security hygiene
The physical risks of data security often get overlooked, but they can still come back to bite you.  The HealthReach Community Health Centers in Maine…
October 4, 2021 2 min read → Read
Articles
Is your location safe from cyber threats?
One vulnerable area of concern, amid the expanding Internet of Things (IoT) and its use of smart devices, remains the security of buildings which themselves…
August 18, 2021 2 min read → Read
Articles
Scraping data from LinkedIn and an oil company’s breach
What does or does not constitute a data breach can sometimes be a little ambiguous.  Data scraping qualifies as such to some, as it utilizes…
July 26, 2021 2 min read → Read
Articles
The gig economy has put corporate data at risk
Compounding the complexity of remote working, a recent rise in the gig economy is spreading enterprise data security issues even wider, as workers are brought…
June 25, 2021 2 min read → Read
Articles
New paradigm of gig workers creates new data security risks
By now, we have seen fairly frequently the numerous risks inherent in the new remote work paradigm.  But cousin to this state of affairs is…
June 3, 2021 3 min read → Read
Articles
When the Dark Side took down a pipeline with ransomware
Generally when you see “Darkside” trending on social media, it’s about something Star Wars related.  Such was not the case recently, but rather a hacking…
May 20, 2021 2 min read → Read
Articles
Regulatory attention to data security
Effective regulatory attention to data security at the national level continues to elude us after all these years.  For as long as a patchwork of…
May 6, 2021 2 min read → Read
Articles
Apple AirDrop security and best practices
A recent Apple event showcased the new AirDrop file sharing service, but a notable security flaw is drawing concern.  With only a good Wi-Fi connection…
April 29, 2021 2 min read → Read
White Papers
Guide to Encryption for Compliance and Data Protection
Encryption has become an important tool for Compliance and Data Protection. But it can seem intimidating.  It does not have to be. Our Beginner’s Guide…
April 21, 2021 1 min read → Read
Articles
Cybercrime does not discriminate across industries
No matter the industry, whether in finance, a ransomware breach of a Canadian construction company, or farming in Australia, the threats posed by compromised data…
March 24, 2021 2 min read → Read
Articles
Ransomware busts and the risks of password reuse
You can always depend on ransomware to make frequent data security headlines.  Recent news from France details how members of the Egregor ransomware group, “suspected…
February 17, 2021 2 min read → Read
Articles
What data responsibilities do businesses have?
A recent lawsuit from Tesla shows the continued impact made by insider threats against a company’s cybersecurity structures.  In this case, their target is a…
January 27, 2021 2 min read → Read
Articles
SolarWinds breach saga continues in the new year
Beginning the cyber New Year in 2021 apparently involves learning that the SolarWinds data breach was more substantial in scope than previously thought.  What it…
January 6, 2021 2 min read → Read
White Papers
Encrypt your SQL Express data, it’s easy!
The threat to your SQL Express Data: For years, SQL Express has been a cost effective solution for your small database requirements, but now more…
January 6, 2021 2 min read → Read
Articles
Approaching cybersecurity in 2021
As we move into the New Year, cybersecurity continues as ever to evolve in various ways.  Of course, this would have been true even in…
December 30, 2020 2 min read → Read
Case Studies
LiftFund’s story of meeting compliance while helping small businesses 
How NetLib Security’s Encryptionizer assisted a nonprofit in their mission Compliance regulations continue to drive companies toward seeking optimal data security solutions.  Meeting such standards…
December 18, 2020 3 min read → Read
Articles
US federal agencies announce data breach
We mentioned recently the acknowledged importance of cybersecurity in the realm of finance and national security.  Now those attitudes will once more be put to…
December 16, 2020 2 min read → Read
Articles
Examining cybersecurity before holiday shopping
While October is Cyber Security Awareness month, it turns out November 30 was Computer Security Day.  As the holiday season now coming upon a quarantined…
December 2, 2020 2 min read → Read
Articles
Global cyber breaches hit various sectors
Cybersecurity breaches are a risk no matter what the industry, or where you are located.  Just last week, the UK soccer/football team Manchester United revealed…
November 25, 2020 2 min read → Read
Articles
Cybersecurity breaches in video games
A couple of video game related data breaches are in the news this week.  Capcom has just posted a press release to its site about…
November 18, 2020 2 min read → Read
Articles
How COVID impacts cybersecurity incidents
Many cybersecurity incidents have, unsurprisingly, become subject to the influence of COVID.  According to the UK’s National Cyber Security Centre (NCSC), more than 200 of…
November 4, 2020 2 min read → Read
Articles
Hackers Hit Therapy Center for Patient Data
Pandemic-induced stress and anxiety are on a constant rise, according to all reports, and the demand for therapy has thus never been higher.  Hackers are…
October 28, 2020 2 min read → Read
Articles
Data security for kids and restaurants
Regulators in Europe are laying out fines for companies that come up short in data protection.  The UK Information Commissioner’s Office has recently hit British…
October 21, 2020 2 min read → Read
Articles
Phishing scheme utilizes CAPTCHA against Microsoft users
Does anybody really like CAPTCHAS?  Those little verification boxes on website login pages that ask you to check a box, or click on all the…
October 7, 2020 2 min read → Read
Articles
Cybersecurity Concerns for IoT and Healthcare
It honestly feels like most of the articles you find about data security, especially where pertaining to the Internet of Things (IoT), could easily begin…
September 30, 2020 2 min read → Read
Articles
Ransomware attacks against sports and education
As the sports world gears back up again, it finds itself a target of ransomware, same as any other sector.  ArbiterSports, which provides software to…
September 23, 2020 2 min read → Read
Articles
Genetic Data Protection and More Healthcare Breaches
More data breaches and privacy laws to hinder them are in the news this week.  California continues to be proactive in this arena, as the…
September 16, 2020 2 min read → Read
Articles
Back to School Cybersecurity Risks
As schools begin to reopen, many are adopting a hybrid format that blends online with traditional, in-person learning (that’s a weird thing to have to…
September 9, 2020 2 min read → Read
Articles
Legacy Workstations Security – What to do when you’re no longer supported
Operating on an old laptop? Have a bunch of old desktops in the office? In light of Microsoft ceasing support of Windows 7 last January,…
September 2, 2020 3 min read → Read
Articles
Exposed database affects millions of social media users
Everyone knows at this point, social media platforms draw cyber criminals like bears to honey…except these bears also have stingers.  Mixed metaphors aside, it’s not…
August 26, 2020 2 min read → Read
Articles
What will be the next big infosec issue?
Major cycles in cybersecurity come and go.  Several years ago, we were covering nonstop stories about things like the payment card industry (PCI), thanks to…
August 20, 2020 2 min read → Read
Articles
School Cybersecurity and Ransomware Attacks
As schools gradually begin to reopen, among all the other safety concerns pressing on districts, one risk that hasn’t subsided is the security of personal…
August 17, 2020 2 min read → Read
Articles
Big data, ethics, and their challenges
Here’s a pretty mind-blowing stat: by 2025, according to IDC, the worldwide collection of data will grow 61% to a total of 175 zettabytes.  One…
August 5, 2020 2 min read → Read
Articles
Examining the Twitter hack and cybersecurity failure
By now you’ve probably heard all about the Twitter hack from last week, when cyber criminals gained access to 130 Twitter accounts, including prominent names…
July 29, 2020 2 min read → Read
Articles
Cybersecurity News Roundup for the Week
All kinds of news items abound this week.  LinkedIn has been sued for allegedly copying data from Apple users’ cut/copy/paste clipboards without consent, in violation…
July 15, 2020 2 min read → Read
Articles
Compliance with new data privacy regulations
As we discussed recently, the California Consumer Privacy Act (CCPA) is now in enforceable effect.  This, despite requests from businesses to delay in light of…
July 8, 2020 2 min read → Read
Articles
Examining the state of privacy regulations
We have now passed a couple of years of GDPR enforcement, and today the California Consumer Privacy Act (CCPA) will also take effect. The result…
July 1, 2020 2 min read → Read
Articles
Planning for compliance and security
A recent ESI Thoughtlab report reveals how many small-to-mid-size businesses are planning to approach cyber-insurance spending over the next few years.  Namely, about 65% of…
June 24, 2020 2 min read → Read
Articles
Skimming data from online shoppers
A new Verizon Data Breach Investigation Report (DBIR) means it’s time to look and evaluate the state of data security across industries. Almost 4,000 data…
June 17, 2020 2 min read → Read
Articles
Simple tips for identifying phishing emails
How can you help in the fight against phishing schemes?  The most simplistic answer is, don’t click on fraudulent emails.  But distinguishing between phishing and…
June 3, 2020 2 min read → Read
Case Studies
Medical device security is more important than ever: how one manufacturer answered the call
Is your patient data protected? For many industries, compliance becomes a trickier issue every year.  New regulations like GDPR and CCPA, in recent years, have…
May 27, 2020 3 min read → Read
Articles
Protecting essential services from cybercrime
Are you finding that you’re cooking more—or at all—thanks to extended quarantine?  Boy do I miss restaurants.  Maybe you do, too.  Maybe you’re even ordering…
May 27, 2020 2 min read → Read
Articles
Phishing schemes cast a wide net during a crisis
The Identity Defined Security Alliance (IDSA) has released a survey of IT professionals that spotlights the growing importance of identities, and the vulnerabilities they create…
May 20, 2020 2 min read → Read
Articles
Group efforts are required to secure data
A number of sites have recently experienced data breaches, and now the stolen information is up for grabs on the dark web.  ShinyHunters, the hacking…
May 13, 2020 2 min read → Read
Articles
Beginners Guide – Securing Legacy Devices
All hospitals and medical facilities have devices that store patient data. On August 21, 1996, the Healthcare Insurance Portability and Accountability Act (HIPAA) was signed into law, and by…
May 12, 2020 2 min read → Read
Articles
Data sharing, collection, and personal privacy concerns
The security risks created by COVID-19 continue to abound.  Applications have proliferated in the wild, offering concerned people the chance to test themselves for Coronavirus. …
May 6, 2020 2 min read → Read
Articles
COVID risks for remote working and small businesses
Amid the financial strains small businesses are enduring throughout the COVID-19 situation, a new data breach has arisen from attempts to provide relief.  Unfortunately, it…
April 29, 2020 2 min read → Read
Articles
Can Zoom’s new security initiatives win back users?
Before the outbreak of COVID-19, I can’t help but wonder how widely known Zoom was.  I had certainly never heard of it, but everyone seems…
April 22, 2020 2 min read → Read
Articles
About that San Francisco Airport breach
Last week we covered security for travel by sea, this week we take a look at the sky.  Not that air travel is as prominent…
April 15, 2020 2 min read → Read
Articles
Phishing schemes and cruise line breaches
With industries around the world struggling to cope with COVID-19, and many smaller businesses especially hurting financially, it is crucial to avoid falling prey to…
April 8, 2020 2 min read → Read
Articles
Statement on COVID-19
To our NetLib Security community, COVID-19 has impacted global civilization in unprecedented ways. Our thoughts go out to everyone who has been personally affected by…
April 8, 2020 1 min read → Read
Articles
What are the best COVID-19 cybersecurity tips?
Looking for tips on how to approach cybersecurity during this pandemic?  Let’s explore a few of the most necessary steps.  After all, by now the…
April 1, 2020 2 min read → Read
Articles
Healthcare providers and COVID security incidents
I’ve heard on the grapevine that there are hackers out there pledging not to target healthcare institutions for the duration of this global COVID-19 pandemic. …
March 25, 2020 2 min read → Read
Articles
COVID-19 creates new cybersecurity concerns
It certainly seems like civilization has come to a halt under the assault of the coronavirus, but one area that hasn’t stopped is cybercrime.  One…
March 18, 2020 2 min read → Read
Articles
Healthcare costs from a data breach
If you’re looking for a clear and specific financial impact data breaches have on healthcare organizations, look no further than a new study from the…
March 11, 2020 2 min read → Read
Articles
How do people respond to breached companies?
The importance of consumer trust for a business is something worth emphasizing from time to time.  People are more likely to do business with companies…
March 4, 2020 2 min read → Read
Articles
App security, and breach reports from government agencies
Reports on data breaches and concerns over data security only increase in number and magnitude as time goes by.  All you have to do to…
February 25, 2020 2 min read → Read
Articles
Ransomware causing cyber insurance to spike
As expected, the pervasive spread of ransomware has presented an increasing threat across all industries.  According to Reuters, it has become such a problem that…
February 12, 2020 2 min read → Read
Articles
Personal information at risk at all times and places
This week is coming out with new data breach stories on an international scale.  Between Mitsubishi and NEC, 2020 has not seen a great start…
February 5, 2020 2 min read → Read
Articles
Investing in Data Security
Companies and executives who want to ensure maximum cyber safety for their organization should pay attention to Cisco’s recently published study.  According to their Data…
January 29, 2020 2 min read → Read
Articles
Facial recognition tech leveraging your social media
As the EU contemplates a temporary ban on facial recognition technology, companies who provide such a service might soon be in legal trouble anyway.  A…
January 22, 2020 2 min read → Read
Articles
Hospital closures and a billion exposed medical images
According to Bloomberg data, at least 30 hospitals in the US went bankrupt in 2019.  Aside from my opinion that this is probably not a…
January 15, 2020 2 min read → Read
White Papers
Transparent Data Encryption (TDE) – Encryptionizer vs. SQL Server
NetLib® Encryptionizer® TDE offers some important advantages over MS SQL Server's Transparent Data Encryption (TDE)
January 11, 2020 1 min read → Read
Articles
Types of data hackers target and the best defenses
I want to highlight a crucial insight from Samantha Ann Schwartz at CIO Dive: in cybersecurity, “success is measured by silence.”  Which means failure is…
January 8, 2020 3 min read → Read
Articles
Security risks in kids toys again this holiday season?
It seems like we cover this at least once a year, probably more: the state of cybersecurity for children’s toys.  Given the holidays now upon…
December 19, 2019 2 min read → Read
Articles
Password Reuse and Cybersecurity Awareness
Forbes writes that in our current BYOD (Bring Your Own Device) world, cybersecurity awareness among an engaged workforce is necessary to navigate safely.  Indeed, both…
December 11, 2019 2 min read → Read
Articles
Cybersecurity for Auld Lang Syne
Whether a product or service is old or new, cybersecurity remains a paramount issue. With the new, there will always be a period of security…
December 6, 2019 2 min read → Read
Articles
Data protection to be thankful for
As we wrap up our Thanksgiving celebrations, T-Mobile should consider giving its own small bit of thanks.  Or at least count itself relatively lucky.  Two…
December 2, 2019 2 min read → Read
Articles
A new method for cybersecurity education?
As we always say, a crucial aspect of good cyber practice in the workplace is education.  Employees can either be a strength or a vulnerability…
November 20, 2019 2 min read → Read
Articles
How confident are you in your cybersecurity readiness?
According to more than half (52%) of the respondents to an Avertium survey, their organization plans to expand their cybersecurity teams in 2020—including both employees…
November 6, 2019 2 min read → Read
Articles
Dangerous stalkerware creeps into people’s lives and homes
Here’s a story fit for the season, although it’s definitely not fun and games.  There are all kinds of dangerous and harmful apps out there,…
October 30, 2019 2 min read → Read
Articles
CaCPA to give consumers more control over their data
As long as there has been a lack of a singular national standard in the US for data privacy law, states have been individually filling…
October 23, 2019 2 min read → Read
Articles
Evolving phishing schemes pose new risks to cybersecurity
Email is perhaps the single most crucial attack vector in cybersecurity today.  According to Verizon’s latest Data Breach Investigations Report, email is the channel used…
October 16, 2019 2 min read → Read
Articles
DoorDash, Zynga, and EA Data Breaches
I hesitate to say this, because I know how influential we are and that their future IPO may take a hit, but I…don’t use DoorDash.…
October 9, 2019 2 min read → Read
Articles
Best Practices for Data Security
Cybersecurity is a more important field today than ever before.  Let’s just get that established right away.  Threats to personal data abound from without and…
October 1, 2019 3 min read → Read
Articles
Cybercrime Activity Up Across the Board
The studies are out, the results are in, and according to Risk Based Security, this year is trending to be the worst ever for data…
September 18, 2019 2 min read → Read
Articles
Managing Insider Threats with Vigilance
Two factors continue to be substantial risks to personal data in an enterprise environment: insider access and third-party breaches. According to the latest Verizon’s Data…
September 5, 2019 2 min read → Read
Articles
Vulnerable data and rising breach costs
It’s no surprise that data breach costs, which have consistently risen in recent years, continue to do just that. A recent annual report from IBM…
August 28, 2019 2 min read → Read
Articles
Surveillance in the Skies
Every so often, you come across a data security story that hits hard, that really stirs the ire.  A story where a company displays such…
August 22, 2019 2 min read → Read
Case Studies
It’s gotta be the shoes! Or is it? The gold is in the data.
What do you think is the key to a successful sports team?  The shoes?  The favorite sports drink?  Player salaries?  Complaining about the referees?  No…
August 2, 2019 4 min read → Read
Articles
Massive Capital One Breach – How did this happen?
I was just in the middle of writing something else when the Capital One story broke.  Considering I’ve already seen it referred to as “the…
July 31, 2019 2 min read → Read
Articles
Preventing a breach and countries targeted by hackers
As we’ve seen recently, the penalties for data breaches are rising across the board.  Just last week British Airways received the new record in GDPR…
July 24, 2019 2 min read → Read
Articles
European regulators not afraid to enforce GDPR penalties
By now you might have heard the news that British Airways is facing a record fine from the UK’s Information Commissioner’s Office (ICO) for a…
July 16, 2019 2 min read → Read
Articles
Continuing consequences from the Equifax breach
Just when you might have thought the Equifax story had been long put to bed, the seventh greatest breach in history has more to offer.…
July 10, 2019 2 min read → Read
Articles
Watch your screen, because someone else is too
When considering the various complex and sophisticated ways cyber criminals can steal data, it can be easy to overlook more mundane risks.  Take a simple…
June 26, 2019 2 min read → Read
Articles
Who is responsible for encrypting data?
Fortunately, the mass Target outage dubbed the Targetpocalypse does not appear to have been the result of a data breach.  Stores nationwide saw their registers…
June 20, 2019 2 min read → Read
Articles
A data buffet for cyber criminals
Both the hospitality and healthcare industries have found themselves in cybersecurity news lately.  Last month, we covered a mysterious data breach where the owner of…
June 12, 2019 2 min read → Read
Articles
SHIELDing Your Personal Information
Well, this is interesting: This is the second week in a row with data breaches involving both encrypted passwords and digital “account tokens,” which connect…
June 5, 2019 2 min read → Read
Case Studies
NetLib Security Encryptionizer Helps MIMICS gain competitive advantage in the Financial Sector
Like any other responsible data steward, MIMICS, a financial software firm, focuses its resources on protecting client data by encrypting databases, managing access and safeguarding…
May 30, 2019 3 min read → Read
Articles
Don’t make hackers famous at your expense
A hacker known as GnosticPlayers has now totaled over 1 billion stolen user credentials from 45 companies, according to ZDNet.  Usually, we don’t mention specific…
May 29, 2019 2 min read → Read
Articles
What can your grocery list tell hackers about you?
One recent social media phenomenon that straddles the line between funny and creepy is how various companies use their accounts.  Whoever runs their Twitter, for…
May 22, 2019 2 min read → Read
Articles
No rest for health care on data security
Making the rounds last week was Verizon’s 2019 Data Breach Investigations Report.  Analyzing over 41,000 security incidents and over 2,000 data breaches during 2018, the…
May 20, 2019 2 min read → Read
Articles
What are the financial costs of a data breach?
It has been a while since we last examined what sort of financial costs companies were enduring due to data breaches.  As it happens, they’re…
May 8, 2019 2 min read → Read
Articles
Mystery database breach – Could you be one of the 80 million exposed?
Here’s a data breach mystery.  It isn’t often that we see a major breach and yet not know for sure who has been affected.  Yet…
May 1, 2019 2 min read → Read
Articles
How to best respond to a data breach
Did you make a resolution to join a gym in 2019?  That’s probably the generic go-to pledge.  If you did, however, and if you ever…
April 24, 2019 2 min read → Read
Articles
Breaches at Microsoft and the Federal Government
It has been a hectic week for cybersecurity.  I can’t even begin by saying “the big news you might have heard about is,” because that…
April 17, 2019 2 min read → Read
Articles
Potential legislation for corporate data negligence?
Congress is sure going for the throat on this one.  Though it is unlikely to pass, Sen. Elizabeth Warren has proposed legislation that would allow…
April 10, 2019 2 min read → Read
Articles
Big Data, Collected and Shared
The recent announcement from the Federal Emergency Management Agency (FEMA)—about accidentally revealing banking and other personal information on over 2 million people—is yet another example…
April 2, 2019 2 min read → Read
Articles
Educating Students on Cybersecurity
Recently checking my old high school’s website, curious how much the curriculum had changed, I was impressed by the differences I found.  Among other new…
March 20, 2019 2 min read → Read
Articles
Cybercrime targeting your kids and your DNA
Part of this blog’s purpose is to keep people up to date with the latest threats from cyber criminals.  Naturally, when we find mention of…
March 7, 2019 2 min read → Read
Articles
How Do You Prioritize Security?
It’s no secret by now that cybersecurity often falls on a lower rung of priorities for companies.  Developers of an application, for example, are most…
February 28, 2019 2 min read → Read
Articles
Taking Customer Privacy Seriously
One interesting little statistic I noticed comes from Zack Whittaker.  In the wake of a data breach, he discovered that there’s one common response companies…
February 21, 2019 2 min read → Read
Articles
Data Personalization and Consumer Trust
“Personalization” is a key concept among data-driven business strategies these days.  Often touted as a benefit to consumers, you can find companies seeking to give…
February 13, 2019 2 min read → Read
Articles
GDPR Enforcement Continues
This past Monday was Data Privacy Day.  To mark the occasion, you could find countless articles offering tips and strategies for minimizing the vulnerability of…
January 31, 2019 3 min read → Read
Articles
GDPR and Data Security Basics
It appears that Europe’s new General Data Protection Regulation (GDPR) law is still fighting pushback, or simply ignorance, from companies handling vast troves of user…
January 23, 2019 2 min read → Read
Articles
What the government shutdown could mean for the security of your personal information
It looks like 2019 is already presenting unique issues for cybersecurity stewards and experts alike.  The Daily Orange states that many customers remain unaware that…
January 17, 2019 2 min read → Read
Articles
Consumer Trust in Cybersecurity in the New Year
I’m sure that if Blackberry had conducted this survey in the 90s—if they had asked people their level of trust in purchasing ‘smart’ cars, TVs,…
January 9, 2019 2 min read → Read
Articles
It’s the season of giving (away your data)
Some more news this week: Facebook keeps faceplanting, and now Twitter also joins in the fun. In the latter case, the avian-logo’d social media platform…
December 20, 2018 2 min read → Read
Articles
Learning From Data Breaches
WIRED has a new analysis on the current state of data breaches, the long, chaotic path that brought us to this point, and where we…
December 17, 2018 2 min read → Read
Articles
Marriott Breach Transcends Cybersecurity
It’s no surprise that the Marriott data breach, announced the other day, has once again elicited sharp criticism and concerns that incidents of this magnitude…
December 5, 2018 2 min read → Read
Articles
LinkedIn’s overeager networking lands them in trouble
During Mark Zuckerberg’s congressional testimony on the Cambridge Analytica data scandal, it came out that a personality app quiz on Facebook had accessed information not…
November 29, 2018 2 min read → Read
Articles
More is More: Cybersecurity Trends to Watch
As we wind down to the end of the year, it’s always important to take stock of where the current state of cybersecurity stands, and…
November 15, 2018 2 min read → Read
Articles
Protecting Voter Data and Election Security
You would be hard pressed this week not to find election security stories from news and especially tech outlets.  And for good reason.  I don’t…
November 7, 2018 2 min read → Read
Articles
Protecting your data when others don’t
While browsing for current cybersecurity stories, I came across this recent article.  Writing for The Hill, 4iQ CEO Monica Pal makes a salient point. For…
October 24, 2018 2 min read → Read
Articles
What Finally Ended Google+
It’s not often that a security breach will result in a company, especially a massive entity like Google, shutting down a major service.  And yet,…
October 10, 2018 2 min read → Read
Articles
Who do consumers trust with their data?
Protip: If you’re going to share your login credentials for entertainment accounts like Netflix or Hulu, as many millennials are doing, make sure your password…
October 4, 2018 2 min read → Read
Articles
Data manipulation and responsibility
It can be hard to definitively assess which industry is most affected by data breaches.  Some research, such as the 2017 Trustwave Global Security Report,…
September 26, 2018 2 min read → Read
Articles
Are you being outspent by cyber criminals?
“Identity theft is not a joke, Jim!  Millions of families suffer every year!” Dwight Schrute may have been the butt of a comedic scene when…
September 20, 2018 2 min read → Read
Articles
Is your data encrypted?
I recently saw a figure that both startled me, but also really did not.  Tech Pro Research conducted a survey of IT professionals, to study…
September 12, 2018 2 min read → Read
Articles
Are data breaches mundane now?
For we who cover the field of data security, its incidents and trends, it is interesting to reflect on how much certain things have changed…
September 10, 2018 2 min read → Read
Articles
Are consumers becoming apathetic about data breaches?
Complacency is an immobilizing condition that can creep up on people at any time, whether a situation is improving or trending down over time.  This…
August 29, 2018 2 min read → Read
Articles
Apple’s Hacky Hack Hack
We’ve already seen recently how young hackers can expose the insecurity of US voting machines in very little time.  Now, it looks like in a…
August 22, 2018 2 min read → Read
Articles
Cybersecurity incidents too big to ignore
I wonder how historians will describe this period in time, specifically pertaining to the rise of data breaches.  Just ten years ago, this would have…
August 15, 2018 2 min read → Read
Articles
Scrambling for data transparency under GDPR
It’s been a few months now since GDPR was finally implemented, and already it seems to be having the intended effect.  In some instances, even…
August 2, 2018 2 min read → Read
Articles
The State of Your Online Anonymity
Have you ever gotten a quick bite at Shake Shack, posted it to Instagram, hopped in a cab (or Uber) and then made an online…
July 26, 2018 3 min read → Read
Articles
Data Breaches at an All Time High
I see some analysts in the field using this time, with the year halfway through, to take stock of the data breaches we’ve encountered so…
July 19, 2018 2 min read → Read
Articles
GDPR Spurs Counterpart Efforts in US
Well, I did wonder a few weeks ago if US citizens might start pushing for a stateside equivalent of GDPR.  Though nothing has yet materialized…
July 11, 2018 2 min read → Read
Articles
How is your data being used, or misused?
Spoilers for season 2 of Westworld The second season of Westworld wrapped up last weekend.  Throughout most of its run, a large issue has been…
June 27, 2018 3 min read → Read
Articles
Cybersecurity Concerns Across Federal Agencies
Earlier this year, the position of federal cybersecurity czar was voided by the US government.  The reasoning behind this questionable decision was that federal agencies…
June 20, 2018 2 min read → Read
Articles
Now that GDPR is here, what does it mean?
Realistically, despite it having now gone into effect, there will still be plenty of entities that drag their feet on GDPR compliance.  For some, rolling…
June 1, 2018 2 min read → Read
Articles
Taking responsibility for data breaches
The New Jersey state legislature has a group of bills circulating, intended to increase company accountability in the event of a breach.  One would require…
May 10, 2018 2 min read → Read
Articles
Cybersecurity and the C-Suite (the C stands for complex)
The growth of the cybersecurity sector has brought many new opportunities for businesses across the board.  Inevitably, however, such increase also brings about greater complexity:…
May 7, 2018 2 min read → Read
Articles
Facebook, Your Data, and Growing Cybercrime Economies
With GDPR implementation looming in Europe, Facebook picked an awkward time to have a major data incident.  Nevertheless, previously planned changes to their platform are…
April 25, 2018 3 min read → Read
Articles
Data Heists From the Headlines
Isn’t there a new Ocean’s Eleven reboot in the works?  I think we’ve just found the plot for the next one.  I love everything about…
April 18, 2018 2 min read → Read
Articles
2018 Cybersecurity Trends to Watch
We’ve often discussed how internal threats in the healthcare industry supersede outside attackers in causing data breaches.  This remains true, according to Verizon’s latest Data…
April 11, 2018 2 min read → Read
Articles
Under Armour’s Low Key Mega Breach
As March Madness finishes up, with Villanova and Notre Dame both victorious, the eyes of sports fan turn back to the NBA, and its own…
April 4, 2018 2 min read → Read
Articles
Eroding Trust in Facebook
It has been a whirlwind couple of weeks for Facebook in the wake of the Cambridge Analytica scandal.  I won’t rehash all the details, since…
March 29, 2018 3 min read → Read
Articles
Consumers look to have their say over data breaches
Major corporate entities will often, after failing to adequately protect countless records of personal information, seek to exonerate themselves as much as possible.  While it’s…
March 14, 2018 2 min read → Read
Articles
Equifax’s data breach is the gift that keeps on taking
Every time we think we’re out, they pull us back in.  Just when we’ve seemingly heard the last of the Equifax story, more damning updates…
March 7, 2018 2 min read → Read
Articles
Monitoring Your Data After a Breach
You might think younger generations would be the least likely to closely monitor their finances, but according to a recent survey from CreditCards.com, this isn’t…
February 28, 2018 2 min read → Read
Articles
Prioritizing Consumer Security: A Comparison
GDPR is steadily approaching.  It is only a few months now until the EU’s General Data Protection Regulation comes into final effect, and European firms…
February 7, 2018 2 min read → Read
Articles
To be, or not to be for data responsibility
Only a short time after being roped into a controversial political situation in the US, Norway has become the victim of a massive data breach. …
January 24, 2018 2 min read → Read
Articles
Social Credit System – Where Will Your Data Rank You?
Among US media, at least, it has long been the prevailing view that Chinese citizens are, on the whole, less demanding when it comes to…
January 17, 2018 2 min read → Read
Articles
VTech and Equifax still on the hook for breaches
Back in 2015, the electronic toy manufacturer VTech suffered a particularly shameful data breach that exposed personal information for millions of people, including children.  Customers…
January 12, 2018 2 min read → Read
Articles
What You Need to Know about the Homeland Security Breach
It looks like we couldn’t go a single week in the new year without a significant data breach of a major government agency.  Right off…
January 8, 2018 2 min read → Read
Articles
Data Security Year In Review – Threats and Breaches Galore
It’s that time of year again.  The time when we look back at the cybersecurity year in review to see what trends soared, what information…
December 27, 2017 2 min read → Read
Articles
Don’t Get Caught Unprepared, GDPR Fast Approaching
It seems that the May 2018 deadline for the EU’s General Data Protection Regulation (GDPR) is approaching just a bit faster than businesses are ready…
December 6, 2017 2 min read → Read
Articles
The Value of Strong Security Policy
One of the most often used, but still meaningful clichés in sports is “culture,” and its importance in building winning teams.  Attitudes, knowledge, the dynamics…
November 29, 2017 3 min read → Read
Articles
SHIELDing Consumers From Data Breaches
The New York City subways have become extremely problematic, enough to warrant a long form Times piece.  Trying to avert disasters in another area, at…
November 22, 2017 2 min read → Read
Articles
Facing the Cyber Threats of the Future
Who would have thought the world of floristry could be so brutal?  Alas, we are simply in a time where small private entities can crash…
November 16, 2017 2 min read → Read
Articles
The Value of Customer Loyalty
At a time when it seems more people are distrustful of institutions that are nominally supposed to look after their interests, it’s not surprising to…
November 9, 2017 2 min read → Read
Articles
Too Many Still Don’t Utilize Encryption
Encryption is the last line of defense in data protection.  Even if all the perimeter barricades are broken, as they often are, encrypting the information…
November 2, 2017 2 min read → Read
Articles
Bridging the Data Breach Confidence Gap
Confidence is a beneficial trait to have, but an excess can get you into trouble.  As I’ve said before, companies who overestimate their cyber protection…
September 28, 2017 2 min read → Read
Articles
Customer Spotlight: Newport Credentialing Solutions
Scott Friesen, CEO of Newport Credentialing Solutions, is proud of the exponential growth that his company has experienced since it was founded in 2009. Newport…
July 13, 2017 2 min read → Read
Articles
BYOD – Bring Your Own Device
Mobile and BYOD (“bring your own device”) security continues to be a pressing concern for businesses of all sizes and verticals.  Everyone is bringing their…
June 21, 2017 2 min read → Read
Articles
Chipotle’s Very Bad Year
Chipotle has certainly had a rough couple of years.  First, in 2015, they were linked to outbreaks of E. coli, salmonella and norovirus, which affected…
May 31, 2017 2 min read → Read
Articles
You say Zomato, I say…data breach
It’s not very often that a breached company will establish contact with their hacker, open a dialogue, and make deals.  That’s what makes this story…
May 25, 2017 3 min read → Read
Articles
Oops, you’ve been hacked
As it happens, the largest data breach in history occurred just last month.  Spam operator River City Media had an email leak of a whopping…
April 28, 2017 2 min read → Read
Articles
Privacy and Public Safety
Americans can’t expect “absolute privacy,” according to controversial FBI director James Comey.  Well, we don’t.  However, I don’t think it’s unreasonable for citizens not to…
March 17, 2017 2 min read → Read
Articles
Don’t be CyberFooled
CSO Online reports that a severe lack of comprehension among Yahoo executives led to the failure to investigate the two major breaches from a few…
March 10, 2017 2 min read → Read
Articles
NetLib Security hits the road for RSA
NetLib Security attended its second RSA Conference last week in San Francisco, where some major themes were big data, analytics, incident management and response, and…
February 24, 2017 2 min read → Read
Articles
Ransomware is Big Business Now
The risk of ransomware attacks that organizations face is growing exponentially.  In 2015, the reported losses from this type of cybercrime totaled $24 million, and…
February 3, 2017 3 min read → Read
Articles
What 2017 will mean for the Internet of Things & Security
It’s a topic I’ve covered a fair amount recently, and it seems to be what everyone is perpetually talking about: The expanded attack surfaces concurrent…
January 20, 2017 3 min read → Read
Articles
Yahoo’s Cyber Problems and Yours
I saw a funny tweet the other day, riffing on the new Star Wars movie, Rogue One. “Find out your Star Wars’ droid name!  Just…
December 23, 2016 2 min read → Read
Articles
Parents & Kids Beware: Back To School Brings Big Identity Risks
It’s back to school time!  Yes, it’s an event that kids all over either anticipate or dread to their souls.  I was generally in the…
September 6, 2016 2 min read → Read
Articles
Hacking an Election
One of the dichotomies in the information security landscape is neatly exhibited in a couple of patchwork systems.  Our hodgepodge national data breach notifications laws…
August 22, 2016 2 min read → Read
Articles
CyberSecurity – fact or fiction?
Our world seems to be rapidly transforming into the vision Masamune Shirow had when he began the story of Ghost in the Shell in 1989.  We’re…
August 2, 2016 3 min read → Read
Articles
Gotta catch ’em all — all security risks, that is
I was asked last week if I could do an article on Pokemon Go, the biggest Pokemon-related phenomenon since the original games took the world…
July 19, 2016 2 min read → Read
Articles
Brexit Won’t Exempt UK From EU Data Regulations
Britain may be eager to extricate itself from the European Union and forge ahead on its own, but as it happens, a stage left Brexit…
July 8, 2016 3 min read → Read
Articles
360 million passwords show dangerous online landscape
This “Peace” hacker is really making a name for him or herself.  A username, that is.  First LinkedIn, now MySpace.  You remember, MySpace?  The social…
June 6, 2016 2 min read → Read
Articles
Fighting the Real Threat in Cybersecurity
Despite ongoing differences, there is one thing both retailers and the financial sector can agree on: Winter is coming.  For cybersecurity, it may even already…
May 24, 2016 2 min read → Read
Articles
Hacking any & everything that moves – don’t drink the water
It bears repeating that one of the most major concerns about cyber crime is how it poses a critical risk to our national infrastructure, if…
April 1, 2016 3 min read → Read
Articles
NetLib Releases Next Generation Data Security Platform at RSA Conference 2016
New Enterprise Manager Delivers Limitless Global Encryption Management for Physical, Virtual and Cloud Environments STAMFORD, CT, February 29, 2016 – RSA Conference – NetLib, a…
March 1, 2016 2 min read → Read
White Papers
SQL Encryption: Difference Between NetLib Security’s Whole Database and Column Level Encryption Methodology
NetLib® Encryptionizer® is the only product line that can provide both whole database and column-level encryption for all Editions and versions of SQL Server. Below…
January 21, 2016 3 min read → Read
Articles
U.S. counter ‘intelligence’ on backdoor encryption
Teen hacker is at it again.  If you recall, back in October, the email account of indignant CIA director John Brennan was infiltrated.  The culprit…
January 18, 2016 2 min read → Read
White Papers
Encryptionizer Vs. Whole Disk Encryption
Encryptionizer allows the separation of roles of the Data Owner, Application Owner and Computer Owner. Often with Whole Disk Encryption, Encryption keys are in the…
January 18, 2016 2 min read → Read
Articles
That’s Not Dell Calling
There’s some sort of shadiness going on over at Dell.  Several users in recent weeks have reported being contacted by people claiming to be Dell…
January 12, 2016 2 min read → Read
White Papers
How can I “Lock Down” my distributed SQL database application?
In this article, we present a method using Encryptionizer where you can “lock down” your distributed SQL database to protect your data and your intellectual…
January 11, 2016 3 min read → Read
White Papers
Automatic Whole Database Encryption Software
Whole Database Encryption: Why is it important? The purpose of whole database encryption is to make a database unusable if it is stolen, copied, downloaded,…
January 11, 2016 3 min read → Read
Articles
Data Security 2015 – Year in Review
Not everyone goes for the whole New Year’s Resolution thing, but in lieu of springing for a new gym membership, organizations worldwide might want to…
December 30, 2015 3 min read → Read
Articles
A short time from now, on a server not so far away…
If you join the Rebel Alliance, you will, at some point, probably be shot at by Stormtroopers.  Now, as is the case with the approximately…
December 18, 2015 3 min read → Read
Articles
Washington’s Encryption Debate
Many of the headlines recently have centered on the VTech breach, and the ongoing investigation into the intrusion that revealed information on more than 5…
December 14, 2015 2 min read → Read
Articles
VTech’s Security Negligence
As it turns out, when I was a little ankle-biter, I had a sort of talking toy phone.  You know, the kind a kid can…
December 2, 2015 3 min read → Read
Articles
CISA – a threat to your privacy and liberty?
Has your email ever been hacked?  Probably.  I’ve had a couple of accounts compromised before and used to send out spam to my contact list…
November 2, 2015 2 min read → Read
Articles
Data Security Update – Cyber Insurance
Insurance commercials proliferate the TV landscape these days.  You can’t go five channels without tripping over a gecko, a general, or a JK Simmons.  Sometimes…
October 16, 2015 1 min read → Read
Articles
You know you’ve made it when you get your own month
Happy Cybersecurity Awareness Month!  Yes, October is host to a number of awarenesses, including cybersec (which makes it timely for Ed Snowden to join Twitter),…
October 8, 2015 2 min read → Read
Articles
Data Security Update – Chip Cards
Today’s the day!  *leaps out of bed* *runs to calendar* *trips and bangs knee* *hobbles to calendar* *circled by hearts and smiley faces, October 1:…
October 1, 2015 2 min read → Read
Articles
Data Security Update – Android Exploit
Amid a troubled security year for Android (including the Stagefright bug found in April), earlier this month Google released the Android 5.1.1 build LMY48M on…
September 18, 2015 1 min read → Read
Articles
Mr. Robot – Cybersecurity’s Growing Prevalence
A new hacking drama premiered last week on USA Network to rave reception. “Mr. Robot” is a show about an antisocial cybersec engineer-by-day/hacker-by-night named Elliot…
July 3, 2015 2 min read → Read
Articles
Healthcare hacks – how much is your personal information worth?
Last month, I spoke of the predicted rise in 2015 of data breaches, for health care organizations in particular.  Anthem may have been the biggest…
May 20, 2015 2 min read → Read
Articles
And the main worry in wearables is…
The Apple Watch is almost here!  After an extremely confusing and limited online-only launch, with marketing campaigns promoting an April 24 release date when in…
May 11, 2015 2 min read → Read
Articles
More Companies are Compliant – But are they secure?
If 2014 was considered the “Year of the Data Breaches,” then it seems to be having an effect, slowly but surely.  Headline after headline of…
March 23, 2015 2 min read → Read

No resources match your search. Try different keywords.

Ready to protect your data?

Try Encryptionizer free — no commitment required.

Start Free Evaluation 1-877-367-1177
NetLib Security
AI Assistant · Online
Hi! I'm the NetLib Security assistant. I can answer questions about our encryption solutions, HIPAA compliance, Encryptionizer, and more. How can I help you today?